False-name Attacks under Uncertainty�In Voting Games and Combinatorial Auctions
EconCS Seminar, Hebrew University, July 2024
Yotam Gafni
Weizmann Institute
Moshe Tennenholtz
Ron Lavi
Based on my PhD work with my advisors:
What are False-name Attacks?
Too ominous to deal with?
Many negative results in different settings:
A Model of Weighted Voting Games (WVGs)
Sybil Attacks in Weighted Voting Games
Past Results for This Model and Related Work
Our Goal
Spoiler: We can guarantee something, for some indices…
Index | Notation | Lower Bound | Tight? |
Shapley-Shubik | | | Yes |
Banzhaf | | | Yes |
Deegan-Packel | | | |
As a numerical example:
It will be more convenient to talk about Big players bounds
So, Recap:
This Goes Back At Least to the 18th Century…
“The number of delegates ought not to be in exact proportion to the number of inhabitants, because the influence and power of those states whose delegates are numerous, will be greater [even relative to their proportion] when compared to the influence and power of the other states...”
(Luther Martin, The Anti-Federalist Papers)
Let’s see some examples
Power and proportion may not coincide II…
Time for Proofs!
Shapley-Shubik – It’s just induction
Some useful definitions and arithmetics…
Some justified simplifying assumptions…
Now we just do the induction over T
What’s Wrong with Banzhaf?
What’s Wrong with Banzhaf?
Deegan-Packel – Separate to Two Regimes
The example is the same as for Shapley
In the high-threshold regime, in any coalition the big players can not be ‘too many’ of this coalition.
In the low-threshold regime, there must be at least twice as many pure small player coalitions than ones that contain big players, because we are on the ‘lower side’ of the binomial (and big players push us even lower).
What’s next?
For the math folks in the crowd…
Reminder: VCG & Combinatorial Auctions
Example: Two Items and Two Bidders
v1({b}) = v1({a}) = 0, v1({a,b}) = 15
v2({b}) = 10, v2({a}) = 10, v2({a,b}) = 10
– VCG allocates 𝒂𝟏 = {a,b}, 𝒂𝟐 ={} and agent 1 (the couple) pays 10.
15
10
10
A False-name Attack for the Example
15
15
15
Is uncertainty the answer to the example?
Left-hand, the attacker’s utility is -20. Right-hand, the attacker’s utility is 10
15
15
15
15
15
15
15
This Calls for a Bayesian Analysis… [Gafni, Lavi & Tennenholtz 2020]
Results…
Agent 1 / Agent 2 | Action A | Action B | Action C |
Action A | 4, 8 | 3,9 | 6,17 |
Action B | 2,6 | 10,5 | 9,5 |
Action C | 5,10 | 3,7 | 5,9 |
What If There is No Bayesian Prior? [Gafni & Tennenholtz 2023]
Let’s apply ’Safety Level’ to the First-price Auction.
The worst-case performance of any under-bid (including exact-bid) is 0, when it does not win the item.
The worst-case performance of overbidding is negative, when it wins the item and pays more than its value.
A Refined Safety Notion
Agent 1 / Agent 2 | Action A | Action B | Action C |
Action A | 4, 8 | 3,9 | 6,17 |
Action B | 2,6 | 10,5 | 9,5 |
Action C | 5,10 | 3,7 | 5,9 |
- How does it apply to the first-price auction?
Discrete First-price Auction with DSL
Discrete First-price Auction with DSL
Ok… and how about VCG under Sybil Attacks?
Exact-bidding Strategies can come in many forms
10
10
30
30
10
10
10
10
20
10
6
20
10
4
An Attacker Can Benefit From an Exact-Bidding Attack
10
10
15
15
10
10
5
5
20
5
5
Conclusion
Future Work?
Bids:
3 rooms, 5000$ total
8 rooms, 10000$ total
1 room, 2000$ total
…